General

  • Target

    2024-05-23_4142d59fd5c874609375b90e4d7148dd_cryptolocker

  • Size

    64KB

  • MD5

    4142d59fd5c874609375b90e4d7148dd

  • SHA1

    d9bb171459cda4d58511b8b5153e297087c67d28

  • SHA256

    67bcd8ef6a91739ee11b55a26aed2dd0eb4857fe47026e7115c3bf40dd6f4fc7

  • SHA512

    8c2ccd43861c0bff152fa02ff83d4b9751680299c34dbc66e085a3827eaa4b9095ee1a61a8cc5ea1c0ba0593fa72e25483028f31f978ea268a9a4280c625c679

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYMzW:1nK6a+qdOOtEvwDpjY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_4142d59fd5c874609375b90e4d7148dd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections